Cargando…
Evolutionary approach to violating group anonymity using third-party data
In the era of Big Data, it is almost impossible to completely restrict access to primary non-aggregated statistical data. However, risk of violating privacy of individual respondents and groups of respondents by analyzing primary data has not been reduced. There is a need in developing subtler metho...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer International Publishing
2016
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4728171/ https://www.ncbi.nlm.nih.gov/pubmed/26844025 http://dx.doi.org/10.1186/s40064-016-1692-9 |
_version_ | 1782412070416809984 |
---|---|
author | Tavrov, Dan Chertov, Oleg |
author_facet | Tavrov, Dan Chertov, Oleg |
author_sort | Tavrov, Dan |
collection | PubMed |
description | In the era of Big Data, it is almost impossible to completely restrict access to primary non-aggregated statistical data. However, risk of violating privacy of individual respondents and groups of respondents by analyzing primary data has not been reduced. There is a need in developing subtler methods of data protection to come to grips with these challenges. In some cases, individual and group privacy can be easily violated, because the primary data contain attributes that uniquely identify individuals and groups thereof. Removing such attributes from the dataset is a crude solution and does not guarantee complete privacy. In the field of providing individual data anonymity, this problem has been widely recognized, and various methods have been proposed to solve it. In the current work, we demonstrate that it is possible to violate group anonymity as well, even if those attributes that uniquely identify the group are removed. As it turns out, it is possible to use third-party data to build a fuzzy model of a group. Typically, such a model comes in a form of a set of fuzzy rules, which can be used to determine membership grades of respondents in the group with a level of certainty sufficient to violate group anonymity. In the work, we introduce an evolutionary computing based method to build such a model. We also discuss a memetic approach to protecting the data from group anonymity violation in this case. |
format | Online Article Text |
id | pubmed-4728171 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2016 |
publisher | Springer International Publishing |
record_format | MEDLINE/PubMed |
spelling | pubmed-47281712016-02-03 Evolutionary approach to violating group anonymity using third-party data Tavrov, Dan Chertov, Oleg Springerplus Research In the era of Big Data, it is almost impossible to completely restrict access to primary non-aggregated statistical data. However, risk of violating privacy of individual respondents and groups of respondents by analyzing primary data has not been reduced. There is a need in developing subtler methods of data protection to come to grips with these challenges. In some cases, individual and group privacy can be easily violated, because the primary data contain attributes that uniquely identify individuals and groups thereof. Removing such attributes from the dataset is a crude solution and does not guarantee complete privacy. In the field of providing individual data anonymity, this problem has been widely recognized, and various methods have been proposed to solve it. In the current work, we demonstrate that it is possible to violate group anonymity as well, even if those attributes that uniquely identify the group are removed. As it turns out, it is possible to use third-party data to build a fuzzy model of a group. Typically, such a model comes in a form of a set of fuzzy rules, which can be used to determine membership grades of respondents in the group with a level of certainty sufficient to violate group anonymity. In the work, we introduce an evolutionary computing based method to build such a model. We also discuss a memetic approach to protecting the data from group anonymity violation in this case. Springer International Publishing 2016-01-26 /pmc/articles/PMC4728171/ /pubmed/26844025 http://dx.doi.org/10.1186/s40064-016-1692-9 Text en © Tavrov and Chertov. 2016 Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. |
spellingShingle | Research Tavrov, Dan Chertov, Oleg Evolutionary approach to violating group anonymity using third-party data |
title | Evolutionary approach to violating group anonymity using third-party data |
title_full | Evolutionary approach to violating group anonymity using third-party data |
title_fullStr | Evolutionary approach to violating group anonymity using third-party data |
title_full_unstemmed | Evolutionary approach to violating group anonymity using third-party data |
title_short | Evolutionary approach to violating group anonymity using third-party data |
title_sort | evolutionary approach to violating group anonymity using third-party data |
topic | Research |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4728171/ https://www.ncbi.nlm.nih.gov/pubmed/26844025 http://dx.doi.org/10.1186/s40064-016-1692-9 |
work_keys_str_mv | AT tavrovdan evolutionaryapproachtoviolatinggroupanonymityusingthirdpartydata AT chertovoleg evolutionaryapproachtoviolatinggroupanonymityusingthirdpartydata |